Which table defines which authorization checks are to be performed with a transaction and which not?
A. RZ11
B. USOBX_C
C. USOBT_C
D. USOBX
SAP offers many types of systems and applications. Each type of SAP system (mySAP CRM, SAP BW, SAP R/3, mySAP SRM, SAP APO) is so varied that the systems do not share security tools or security services. Determine whether this statement is true or false
A. True
B. False
What are the 2 main options to create and save audit filters?
A. Create and save filters permanently in the database
B. Change filters dynamically
C. Create and save filter temporary in the database
ABAP Workbench components that are protected with S_DEVELOP A. ABAP development tools
B. ABAP Dictionary and Data Modeler
C. Screen Painter and Menu Painter
D. ABAP WORKBENCH COMPONENTS
ITS configuration: What is the difference between a single host configuration and a dual host configuration?
A. Single Host
B. Dual Host
C. Multiple Host
How do you protect access to the ITS service and template files?
A. Using groups at the operating system level
B. Using groups at the creation dolmen level
What are the 2 different worlds for SSO?
A. SAP GUI for Windows SNC
B. Web SSL C. SAP RTD for Windows SFG
7 activities of the ICM monitor?
A. Start and Stop the ICM
B. Set trace level, view logs
C. View profile parameters settings View statistics
D. View memory pipe informationView active services
E. Monitor service cache
F. Start Memory in icm
SSL encryption with WAS. 4 info to specify with the help of profile parameters?
A. Specify Plug-in
B. Specify Server Port
C. Specify whether to use client certificate
D. Software load balancer
E. Specify location of sap cryptolab